From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Prospect Theoretical Extension of a Communication Game Under Jamming., и . CISS, стр. 1-6. IEEE, (2019)Subverting MIMO wireless systems by jamming the channel estimation procedure., и . WISEC, стр. 19-24. ACM, (2010)Multi-User Security: A Signal Processing and Networking Perspective.. University of Maryland, College Park, MD, USA, (2002)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/24911).A Dilemma in the Communication of a UAV with its Controller., , и . IGTR, 22 (2): 2040003:1-2040003:15 (2020)A security and robustness performance analysis of localization algorithms to signal strength attacks., , , , и . ACM Trans. Sens. Networks, 5 (1): 2:1-2:37 (2009)A Multi-Jammer Power Control Game., , , и . IEEE Commun. Lett., 25 (9): 3031-3035 (2021)Distance-Aware Overlay Routing with AODV in Large Scale Ad Hoc Networks., , , и . VTC Fall, стр. 1-5. IEEE, (2014)Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks., , , и . INFOCOM, стр. 666-674. IEEE, (2009)Towards Continuous Asset Tracking: Low-Power Communication and Fail-Safe Presence Assurance., , , , , и . SECON, стр. 1-9. IEEE, (2009)Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments., , и . CrownCom, стр. 148-153. ICST / IEEE Computer Society, (2013)